top of page
Cloud Management and Security

Cloud Management and Security

IT Programs

By the end of the course, participants will be able to:
- Understand cloud strengths and misconceptions, and discuss its benefits and weaknesses
- Explain cloud structure, properties and management services
- Set a cloud adoption strategy
- Discuss the main requirements to move current cloud untrusted infrastructure to a trustworthy internet-scale cloud critical computing infrastructure
- Analyze the major risks associated with the different cloud services and deployment models
- Discuss the main principles, mechanisms and best practices for treating cloud risks
- Demonstrate the discussed concepts using practical case studies, business models and industrial tool


Module 1: Cloud overview
Module 2: Cloud management
Module 3: Establishing trust in clouds
Module 4: Identity and access management
Module 5:Provenance in clouds


This course is highly interactive and includes group discussions, case studies and syndicate work. It also includes practical exercises that allow all participants to use the knowledge they gained to demonstrate their skills in cloud management and security.


2 Days




On premises; online; others

Cloud Management and Security
bottom of page